首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7614篇
  免费   493篇
各国政治   369篇
工人农民   299篇
世界政治   499篇
外交国际关系   259篇
法律   5246篇
中国政治   40篇
政治理论   1356篇
综合类   39篇
  2020年   166篇
  2019年   173篇
  2018年   189篇
  2017年   224篇
  2016年   234篇
  2015年   207篇
  2014年   189篇
  2013年   815篇
  2012年   169篇
  2011年   184篇
  2010年   220篇
  2009年   233篇
  2008年   179篇
  2007年   178篇
  2006年   184篇
  2005年   172篇
  2004年   199篇
  2003年   171篇
  2002年   146篇
  2001年   319篇
  2000年   259篇
  1999年   235篇
  1998年   108篇
  1997年   74篇
  1996年   78篇
  1995年   84篇
  1994年   98篇
  1993年   98篇
  1992年   162篇
  1991年   168篇
  1990年   159篇
  1989年   160篇
  1988年   132篇
  1987年   138篇
  1986年   126篇
  1985年   137篇
  1984年   107篇
  1983年   122篇
  1982年   87篇
  1981年   79篇
  1980年   59篇
  1979年   113篇
  1978年   70篇
  1977年   60篇
  1976年   51篇
  1975年   51篇
  1974年   56篇
  1973年   55篇
  1972年   45篇
  1968年   40篇
排序方式: 共有8107条查询结果,搜索用时 15 毫秒
41.
In the following paper, I analyze the influence of advisers and domestic political factors on President Clinton's decision to use force against Slobodan Milosevic and the Serbs in Kosovo in March 1999. I present an analysis and examination of President Clinton's decision-making process, using press reports, personal speeches, etc. In other words, I attempt to trace the process by which Clinton came to the decision to use force in Yugoslavia. Specifically, using the poliheuristic theory, I argue that President Clinton's decision was influenced by noncompensatory domestic political calculations and the strong influence of his Secretary of State, Madeleine K. Albright. Examining how advisers interact with one another, their status in the advisory group, and the manner in which presidents solicit information from advisers will further our understanding of how, when, and under what conditions national security-level decision makers make decisions.  相似文献   
42.
The social development model (SDM) is a theory of behavior that has proven useful in explaining the etiology of delinquency, violence, and substance use among adolescents as well as early antisocial behavior among pre-adolescents. A further test of the model is its generalizability across population groups. A section of the SDM representing prosocial influences in the etiology of problem behavior was compared for boys and girls and for children from low- and non low-income families using three waves of child, parent and teacher survey data on a sample of 851 elementary school students. Multiple group structural equation modeling was used to assess differences across groups in both measurement of model constructs and hypothesized structural paths between constructs. The results indicate overall similarity in the reliability of measurement models and validity of structural models.  相似文献   
43.
44.
45.
The purpose of this investigation was to identify inmate personal and demographic data that may be used to further define or profile persons with a greater likelihood of being at risk for serving a jail sentence. This study was explorative. The survey administration was similar in format to that conducted by the U.S. Department of Justice. Chaplains were used as survey proctors. Pilot studies were conducted to determine the suitability of survey content. Surveys consisted of 172 items. Subjects included four hundred inmates: males comprised 88.75 percent of the sample, Caucasians 58.25 percent, Blacks 37 percent, Hispanics 3.25 percent and other 1.5 percent of the sample. Respondents ranged in age from 15 to 64 years with an average age of 30.3 years. Less than two percent of the contacted inmates refused participation in the survey. Results are presented for demographic data, select legal/criminal data, select drug and alcohol use data, employment data, health, parent/family data, education data, social data, and “other”.  相似文献   
46.
Conclusion The Regulations appear to have reinforced the protection available to software producers under United Kingdom law. The provisions of the Software Directive and the Regulations are complex and not without significant inconsistencies which are likely to prove to be a source of litigation. The drafters of the Regulations chose, unlike many of its European partners, not to adopt the wording of the Software Directive but to write their own interpretation, adding an element of uncertainty to the law in this area, which is perhaps inevitable bearing in mind the linguistic problems of translating and interpreting any directive coupled with the ambiguity and omission of definitions of several key terms. More important, however, than any academic argument will be the practical impact of the new law and its effectiveness in achieving its aim.  相似文献   
47.
48.
This paper describes a collaborative exercise intended to demonstrate whether uniformity of DNA profile results could be achieved between different European laboratories. It was shown that this goal can be obtained provided that a common protocol is followed (specifically the use of a common electrophoretic buffer as being the most important parameter). Generally, lower molecular weight loci (with lower molecular weight fragments) such as YNH24 perform better than higher molecular weight loci such as MS43a. The results of the exercise are discussed in relation to the objectives of the European DNA profiling group (EDNAP).  相似文献   
49.
The authors examine the characteristics of threatening and otherwise inappropriate communications sent to members of the U.S. Congress by a sample of 86 subjects, 20 of whom threatened assassination. We quote excerpts from these letters and provide quantitative data on such variables as the volume, duration, form, and appearance of such communications; the enclosures; the subjects' perceived relationships to the recipients; the thematic content of the communications; and the messages and threats communicated. Comparisons between 43 subjects who pursued encounters with members of Congress and 43 who did not revealed 17 factors associated with such pursuit. In this population, threateners were significantly less likely to pursue an encounter than inappropriate letter writers who did not threaten, regardless of the type of threat or the harm threatened. Inappropriate letters to members of Congress are compared with those directed to Hollywood celebrities. Mentally disordered persons writing to public figures often mention and sometimes threaten public figures other than those to whom the letters are addressed, which raises important issues regarding notification of endangered third parties and the sharing of information among protective agencies.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号